The mathematics, computer science and electrical engineering academic communities began paying attention to cryptography sometime in the mid-1970s. The fruits of the work that was then being performed at MIT and Stanford [1,2] now forms the backbone of communication security, including online shopping, logging into email servers and corporate VPNs, and many other activities we perform over the Internet or via cellular communication networks. The remarkable history of the development of cryptography during the last quarter of the last century consists mainly of fragments in several different books or in the memories of our colleagues. Yet in these 25–30years, just a handful of people in several universities and research centers in the US and Europe created a set of cryptographic algorithms and protocols that demonstrated the meaning and the measure of cryptographic strength [1–10]. The online security of billions of consumers now depends on the infrastructure developed according to these cryptographic principles. The story would not be complete, however, if we stopped thinking and talking about it right at this point. The invention of cryptographic algorithms and protocols, particularly public-key algorithms, digital signatures, hash functions and message authentication methods, was essential for the security of our computers, laptops, smart phones and servers. However, equally important are the hardware and software realizations for the platforms on which they run. There are some significant challenges in high-speed, small-space (circuit size or code space) implementations of